Photo AI

SECTION A: SHORT QUESTIONS QUESTION 1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2

Question icon

Question 1

SECTION-A:-SHORT-QUESTIONS--QUESTION-1--Various-options-are-provided-as-possible-answers-to-the-following-questions-NSC Information Technology-Question 1-2018-Paper 2.png

SECTION A: SHORT QUESTIONS QUESTION 1 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A t... show full transcript

Worked Solution & Example Answer:SECTION A: SHORT QUESTIONS QUESTION 1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2

Step 1

1.1.1 The most common protocol used to send e-mail is known as ...

96%

114 rated

Answer

The most common protocol used to send e-mail is known as SMTP (Simple Mail Transfer Protocol). SMTP is the standard for sending emails across networks.

Step 2

1.1.2 Which ONE of the following refers to an encryption process used to authenticate the identity of the sender of an e-mail message?

99%

104 rated

Answer

The process that refers to an encryption used to authenticate the identity of the sender of an e-mail message is a Digital Certificate. Digital certificates are used to confirm the identity of the sender.

Step 3

1.1.3 Which ONE of the following refers to a data structure that is non-volatile?

96%

101 rated

Answer

The data structure that is non-volatile is a Text File. Unlike volatile memory, text files maintain their data even when the power is turned off.

Step 4

1.2.1 Which of the above assignment statements will cause a compilation/syntax error?

98%

120 rated

Answer

The statements that cause compilation/syntax errors are (ii) and (iv). The second statement tries to assign a real value to an integer variable without proper casting, and the fourth is attempting to use mod on a real number.

Step 5

1.2.2 Determine the value of sAnswer after the execution of the statements below.

97%

117 rated

Answer

After executing the assignment statements, the value of sAnswer will be IfnT. The copy function extracts 'Inf' based on the position found, and then 'T' is inserted into the second position.

Step 6

1.3.1 Web applications designed to deliver the functions and features of a traditional desktop application online.

97%

121 rated

Answer

RIA (Rich Internet Applications). RIAs provide user interaction similar to that of desktop applications while running in a web environment.

Step 7

1.3.2 An type of information system that gathers, analyses and presents information for the management, operations and planning levels of an organization.

96%

114 rated

Answer

Decision Support System (DSS). DSS helps in processing data to assist in decision-making activities.

Step 8

1.3.3 Downloaded software that bombards the user with advertisements

99%

104 rated

Answer

Adware. This software is designed to display advertisements on your computer.

Step 9

1.3.4 A remotely controlled network of zombie computers.

96%

101 rated

Answer

Botnet. A network of infected machines controlled remotely by an attacker.

Step 10

1.3.5 A type of memory that stores the BIOS settings.

98%

120 rated

Answer

CMOS. This memory type retains BIOS settings when the computer is powered off.

Step 11

1.3.6 Testing the accuracy of captured data by checking it against the source of the data.

97%

117 rated

Answer

Data Verification. This process ensures that the data collected is accurate and reliable.

Step 12

1.3.7 Someone who gains unauthorized access to data in order to steal data or someone who makes unauthorised changes to data.

97%

121 rated

Answer

Black hat hacker/cracker. This term describes individuals who exploit computer systems for malicious purposes.

Step 13

1.3.8 Specialised hardware and software designed to be used at till points.

96%

114 rated

Answer

Point of Sale (POS) system. This system is used for sales transactions in a retail environment.

Step 14

1.3.9 E-mail sent to people that advertise products that are not relevant to them.

99%

104 rated

Answer

Spam. This comprises unsolicited emails typically intended for advertising.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;